Skip to content

Commit 1bdc755

Browse files
committed
add some context / minor edits
1 parent 3955094 commit 1bdc755

File tree

1 file changed

+23
-14
lines changed

1 file changed

+23
-14
lines changed

breakouts/slsa_source_track_breakout.md breakouts/source-code-integrity.md

+23-14
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,20 @@
1+
# Source Code Integrity
2+
3+
This breakout session was proposed to discuss source code integrity in the
4+
context of software supply chain security efforts like the SLSA framework and
5+
gittuf. After a round of introductions, the session discussed what SLSA is and
6+
its draft proposal for source code integrity (known as the SLSA source track).
7+
18
## Open Discussion
29

310
* SLSA is meant to establish standards / language to communicate how trustworthy development processes are
411
* Breaks standards into levels: higher the level, the better the guarantees
512
* V1.0 has Build track: how builders can secure transforming source code to build artifacts like binaries
6-
* Build level 1: protects against mistakes, documentation
7-
* Build level 2: protects against tampering after the build
8-
* Build level 3: some protections during build with isolation requirements, etc.
9-
* Build track allows for mapping a binary artifact to the source code that produced it
10-
* But raises the question about how to trust the source code
13+
* Build level 1: protects against mistakes, documentation
14+
* Build level 2: protects against tampering after the build
15+
* Build level 3: some protections during build with isolation requirements, etc.
16+
* Build track allows for mapping a binary artifact to the source code that produced it
17+
* But raises the question about how to trust the source code
1118
* Q: does build level 3 include reproducible builds?
1219
* No, this was discussed extensively and was part of the spec pre v1.0
1320
* On a related note, there’s a separate track being worked on to get hardware attested trust for a build, that provides some similar guarantees
@@ -28,9 +35,10 @@
2835
* Not 100% sure about CRA, but maps to requirements in SSDF etc and perhaps similar?
2936
* Additionally, SLSA is more verifiable with tooling rather than a human-filled checklist
3037
* SLSA \<-\> gittuf
31-
* SLSA doesn’t want to require a specific toolchain for managing source code
38+
* SLSA doesn’t want to require a specific toolchain for enforcing source code
39+
integrity
3240
* Requiring a specific toolchain would also stop the development of new tools
33-
* Is the ambition of SLSA to get bigger players (Google etc) to align on these goals? Startups?
41+
* Is the ambition of SLSA to get bigger players (Google etc.) to align on these goals? Startups?
3442
* Large enterprises and startups
3543
* Related: do we expect small orgs / engineers to implement controls?
3644
* One set of SLSA’s consumers are in fact developer tooling / platforms builders who can build requirements into tooling to make it available invisibly to end users
@@ -44,14 +52,14 @@
4452
* Yes, that could well be the case
4553
* If the vendor is a hobbyist, it’s on the enterprise to compensate the hobbyist
4654
* What’s the tooling to verify the attestations for some repo you’re consuming?
47-
* One option is to trust the attestation to an extent, check the revision matches the attestation, etc.
48-
* Who makes the attestation (maintainer of repository vs someone else for eg) is an interesting question
49-
* gittuf
50-
* SLSA isn’t prescriptive
55+
* One option is to trust the provider of the attestation to an extent, check the revision matches the attestation, etc.
56+
* Who makes the attestation (maintainer of repository vs someone else for example) is an interesting question
57+
* Back to gittuf
58+
* SLSA isn’t prescriptive about tooling
5159
* You can meet a lot of these requirements by trusting a platform to do them
5260
* But maybe we can go further and remove the need to trust the platform
53-
* What does it mean to be SLSA Level 3 if the system enforcing those things can be compromised
54-
* Thoughts on code review
61+
* What does it mean to be SLSA Level 3 if the system enforcing those things can be compromised? That's what gittuf addresses in the context of the source track
62+
* Thoughts on code review as a source track requirement
5563
* Anonymity / pseudo-anonymity are important
5664
* Individuals can’t meet this requirement
5765
* In startups: requiring code reviews would be difficult
@@ -65,4 +73,5 @@
6573
## Links
6674

6775
* SLSA community: [https://slsa.dev/community](https://slsa.dev/community)
68-
* Source Track *Draft:* [https://slsa.dev/spec/draft/source-requirements](https://slsa.dev/spec/draft/source-requirements)
76+
* SLSA Source Track *Draft*: [https://slsa.dev/spec/draft/source-requirements](https://slsa.dev/spec/draft/source-requirements)
77+
* gittuf: [https://github.com/gittuf/gittuf](https://github.com/gittuf/gittuf)

0 commit comments

Comments
 (0)